US20020133709A1 - Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS - Google Patents

Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS Download PDF

Info

Publication number
US20020133709A1
US20020133709A1 US09804796 US80479601A US2002133709A1 US 20020133709 A1 US20020133709 A1 US 20020133709A1 US 09804796 US09804796 US 09804796 US 80479601 A US80479601 A US 80479601A US 2002133709 A1 US2002133709 A1 US 2002133709A1
Authority
US
Grant status
Application
Patent type
Prior art keywords
data
system
virus
void
element
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US09804796
Inventor
Terry Hoffman
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TERMAN SOFTWARE APPLICATIONS LLC
Original Assignee
Hoffman Terry George
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/564Static detection by virus signature recognition
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Abstract

By a sequencing of programmed information, coupled with optical scanners, separated by a ‘Void’ or ‘Gap’, there is no possibility for a rogue virus to infiltrate the recipient's system.
Additionally, by the inclusion in the base process of specially designated patterns of receipt of data, a basic level of security is automatically built in. This security can be enhanced by developing levels of identification encryption, which are proprietary to the recipient's system.

Description

    CROSS REFERENCE TO RELATED APPLICATIONS
  • [0001]
    1. Computer Anti-Virus Protection System
  • [0002]
    2. Optically Based Secure Data Transfer System
  • STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT
  • [0003]
    None; Not Applicable
  • REFERENCE TO A MICROWAVE APPENDIX
  • [0004]
    None; Not Applicable
  • BACKGROUND OF INVENTION
  • [0005]
    The system has its basis in the concept of soundless messaging developed between ocean going vessels during the First World War and enhanced by encryption during the Second World War. Messaging was accomplished by light signals between ships.
  • [0006]
    There is one primary distinguishing difference between traditional ‘anti-virus’ methodologies and the concept being presented herein. With existing programs and technological support, Viruses ride on the information transferred, either as riders to the information itself or as riders to the program identification command process. A physical break in the flow of either the ‘driver’ program or the transfer of ‘hard’ data, would prevent a parasite from being able to jump from the source to the recipient.
  • BRIEF SUMMARY OF THE INVENTION
  • [0007]
    ODTS/OBAPS is a system, comprised of both software and hardware components. It is designed to permit the subscriber to 1: protect the relay of information from being compromised or polluted by rouge viruses and, 2: electronically encrypt the data, so as to maintain the confidential integrity of the information being relayed.
  • [0008]
    It is based on fiber optics as the physical medium for transfer of data. It utilizes existing server and scanner technology, coupled with a regimen of commands, in software vocabulary, to transfer the data ‘bubble’ to the correct destination point. It proposes to utilize existing methodology to translate data from electronic bubbles of information to decipherable text or diagrammatic representations.
  • [0009]
    The specific characteristic of light pattern signalization, coupled with the ‘Void”, is that the recipient scanner can accept the light based code, without importing the rouge virus attached, or ‘riding’ within the transmission. This characteristic of light coding is not achievable with conventional forms of sound based transmissions.
  • [0010]
    By creating a physical ‘void’ and precoding command drivers and address points, the system, presented herein, optically scans and imports data, in designated ‘fields.’ Since the fields of data need to be customized, by user, based on the user's data needs, the proprietary utilization (pre-coded coordinates) of the fields themselves have the ability to become a form of encryption. Thus, the data has the characteristic of not being accessible to outside sources, which are external to the system. Nor can external sources have access to encrypted coding to determine the active scan fields. Additionally, there can be a random rotation of passwords to determine entry into the system. The sender does not have to know the pathway of choice, on any given day, to the final fields of data import.
  • [0011]
    To recap, the primary value is two-fold. Firstly, by creating a ‘dam’ rather than a ‘bridge’, the virus is contained or isolated from the recipient. Secondly, by having user specific addresses and fields of data scans, there exists inherently, in the concept ‘system,’ a modified form of encryption, which can be easily code-scrambled, creating further levels or degrees of security.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING
  • [0012]
    Attached is a Process Flow Chart, illustrating the Concept Design. The diagram represents the conceptual Flow Process and the linkages and sequential manner by which the hardware and software interrelate.
  • DETAILED DESCRIPTION OF THE INVENTION
  • [0013]
    The Invention is a system comprised of hardware and software that, by inclusion of a ‘void’ or ‘gap’, protects the transmission of data from acting as a vehicle of bridge for the import of a rogue virus.
  • [0014]
    The device is ‘in-line’ with the movement of data. It assumes that the data is moved by fiber optic cable, in light patterns or ‘electronic information bubbles’.
  • [0015]
    In large systems, the device can be either at the NAP distribution point that precedes the final transmittal address or can be internal to the installation point. This creates a redundancy of equipment for the user, but assures complete protection from any tapped intruder.
  • [0016]
    In small systems (LAN or individual PC) the device is positioned at the local point to receipt, prior to the PC or router.
  • [0017]
    Traditional data transfer is a two element process. Element 1 is the address routing. Element 2 is the actual data transmission with the ‘language’ driver: .doc, .xis, .pp, etc.
  • [0018]
    The revised sequence proposed requires four elements. Element 1 is the address routing. Element 2 is the ‘Driver Code Identification. Element 3 is the ‘Scan Pattern Code.’ Element 4 is the actual data to be scanned.
  • [0019]
    Both sides of the Void work the same way, but in reverse reading. The drawing attached indicates the five sequence relationship of elements.

Claims (2)

  1. 1: The physical ‘void’ in the data transmission process does NOT allow the virus to ride on the transmission. (Note: the Void exists, even is the two graphic scanner are physically contacting. The Virus cannot ‘leap’ the Void.
  2. 2: Via the integration of linkages and the coded sequencing (integrated hardware and software), a basic level of self encrypted security is created that can be further scrambled and encrypted, without compromising speed of transmission or capacity.
US09804796 2001-03-14 2001-03-14 Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS Abandoned US20020133709A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US09804796 US20020133709A1 (en) 2001-03-14 2001-03-14 Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09804796 US20020133709A1 (en) 2001-03-14 2001-03-14 Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS
US10346025 US6732279B2 (en) 2001-03-14 2003-01-16 Anti-virus protection system and method
US11418553 USRE42212E1 (en) 2001-03-14 2006-05-03 Protection system and method

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10346025 Continuation-In-Part US6732279B2 (en) 2001-03-14 2003-01-16 Anti-virus protection system and method

Publications (1)

Publication Number Publication Date
US20020133709A1 true true US20020133709A1 (en) 2002-09-19

Family

ID=25189856

Family Applications (2)

Application Number Title Priority Date Filing Date
US09804796 Abandoned US20020133709A1 (en) 2001-03-14 2001-03-14 Optical data transfer system - ODTS; Optically based anti-virus protection system - OBAPS
US11418553 Active USRE42212E1 (en) 2001-03-14 2006-05-03 Protection system and method

Family Applications After (1)

Application Number Title Priority Date Filing Date
US11418553 Active USRE42212E1 (en) 2001-03-14 2006-05-03 Protection system and method

Country Status (1)

Country Link
US (2) US20020133709A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090109033A1 (en) * 2007-09-26 2009-04-30 Roberto Salvat Medical System And Tracking Device
US20110077024A1 (en) * 2007-09-26 2011-03-31 Salvat Jr Roberto Medical System And Tracking Device
US20110227722A1 (en) * 2007-09-26 2011-09-22 Salvat Jr Roberto Tracking System And Device

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9348927B2 (en) 2012-05-07 2016-05-24 Smart Security Systems Llc Systems and methods for detecting, identifying and categorizing intermediate nodes
US9325676B2 (en) 2012-05-24 2016-04-26 Ip Ghoster, Inc. Systems and methods for protecting communications between nodes

Family Cites Families (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5432850A (en) 1992-07-02 1995-07-11 Lannet Data Communications Ltd. Method and apparatus for secure data transmission
US5511122A (en) 1994-06-03 1996-04-23 The United States Of America As Represented By The Secretary Of The Navy Intermediate network authentication
US5416842A (en) 1994-06-10 1995-05-16 Sun Microsystems, Inc. Method and apparatus for key-management scheme for use with internet protocols at site firewalls
US5978567A (en) 1994-07-27 1999-11-02 Instant Video Technologies Inc. System for distribution of interactive multimedia and linear programs by enabling program webs which include control scripts to define presentation by client transceiver
US5623600A (en) 1995-09-26 1997-04-22 Trend Micro, Incorporated Virus detection and removal apparatus for computer networks
US6067620A (en) 1996-07-30 2000-05-23 Holden; James M. Stand alone security device for computer networks
GB9616783D0 (en) 1996-08-09 1996-09-25 Apm Ltd Method and apparatus
US6157721A (en) 1996-08-12 2000-12-05 Intertrust Technologies Corp. Systems and methods using cryptography to protect secure computing environments
US5983350A (en) 1996-09-18 1999-11-09 Secure Computing Corporation Secure firewall supporting different levels of authentication based on address or encryption status
US5898830A (en) 1996-10-17 1999-04-27 Network Engineering Software Firewall providing enhanced network security and user transparency
US5930479A (en) * 1996-10-21 1999-07-27 At&T Corp Communications addressing system
US6167520A (en) 1996-11-08 2000-12-26 Finjan Software, Inc. System and method for protecting a client during runtime from hostile downloadables
US5958051A (en) 1996-11-27 1999-09-28 Sun Microsystems, Inc. Implementing digital signatures for data streams and data archives
US6105027A (en) 1997-03-10 2000-08-15 Internet Dynamics, Inc. Techniques for eliminating redundant access checking by access filters
US5968126A (en) * 1997-04-02 1999-10-19 Switchsoft Systems, Inc. User-based binding of network stations to broadcast domains
US6049877A (en) 1997-07-16 2000-04-11 International Business Machines Corporation Systems, methods and computer program products for authorizing common gateway interface application requests
US5991810A (en) * 1997-08-01 1999-11-23 Novell, Inc. User name authentication for gateway clients accessing a proxy cache server
US6061796A (en) 1997-08-26 2000-05-09 V-One Corporation Multi-access virtual private network
US6098172A (en) 1997-09-12 2000-08-01 Lucent Technologies Inc. Methods and apparatus for a computer network firewall with proxy reflection
US6108583A (en) 1997-10-28 2000-08-22 Georgia Tech Research Corporation Adaptive data security system and method
US6229806B1 (en) 1997-12-30 2001-05-08 Motorola, Inc. Authentication in a packet data system
US7032242B1 (en) * 1998-03-05 2006-04-18 3Com Corporation Method and system for distributed network address translation with network security features
JP3969467B2 (en) 1998-06-17 2007-09-05 富士通株式会社 Network system, receiving method, transmission apparatus, reception apparatus, and a recording medium
US6202081B1 (en) * 1998-07-21 2001-03-13 3Com Corporation Method and protocol for synchronized transfer-window based firewall traversal
US20020040439A1 (en) 1998-11-24 2002-04-04 Kellum Charles W. Processes systems and networks for secure exchange of information and quality of service maintenance using computer hardware
US6523068B1 (en) * 1999-08-27 2003-02-18 3Com Corporation Method for encapsulating and transmitting a message includes private and forwarding network addresses with payload to an end of a tunneling association
US6510464B1 (en) * 1999-12-14 2003-01-21 Verizon Corporate Services Group Inc. Secure gateway having routing feature
US6324648B1 (en) * 1999-12-14 2001-11-27 Gte Service Corporation Secure gateway having user identification and password authentication
US20020069356A1 (en) 2000-06-12 2002-06-06 Kwang Tae Kim Integrated security gateway apparatus
US6732279B2 (en) 2001-03-14 2004-05-04 Terry George Hoffman Anti-virus protection system and method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090109033A1 (en) * 2007-09-26 2009-04-30 Roberto Salvat Medical System And Tracking Device
US20110077024A1 (en) * 2007-09-26 2011-03-31 Salvat Jr Roberto Medical System And Tracking Device
US20110227722A1 (en) * 2007-09-26 2011-09-22 Salvat Jr Roberto Tracking System And Device
US8659420B2 (en) 2007-09-26 2014-02-25 S.I.P. Holdings, Llc Tracking system and device

Also Published As

Publication number Publication date Type
USRE42212E1 (en) 2011-03-08 grant

Similar Documents

Publication Publication Date Title
McCullough Specifications for multi-level security and a hook-up
Mueller et al. Ocean optics protocols for SeaWiFS validation, revision 1
Reidenberg Lex informatica: The formulation of information policy rules through technology
US6178243B1 (en) User-controlled document processing
Cole Hiding in plain sight
US7313822B2 (en) Application-layer security method and system
US7039801B2 (en) System and method for integrating secure and non-secure software objects
US20070074046A1 (en) Secure microprocessor and method
US20040073634A1 (en) Highly accurate security and filtering software
US7523498B2 (en) Method and system for monitoring personal computer documents for sensitive data
US5864683A (en) System for providing secure internetwork by connecting type enforcing secure computers to external network for limiting access to data based on user and process access rights
US7096497B2 (en) File checking using remote signing authority via a network
US20130263263A1 (en) Web element spoofing prevention system and method
US20120317239A1 (en) Method and system for collaborative editing of a remotely stored document
Prevelakis et al. Sandboxing Applications.
US20030204719A1 (en) Application layer security method and system
Khare et al. Weaving a web of trust.
White Open problems in computer virus research
US20020015497A1 (en) Hub apparatus with copyright protection function
Provos et al. Cybercrime 2.0: when the cloud turns dark
US20050154890A1 (en) Method for secure key exchange
US20050210270A1 (en) Method for authenticating a user profile for providing user access to restricted information based upon biometric confirmation
Nguyen-Tuong et al. Automatically hardening web applications using precise tainting
US8001603B1 (en) Variable scan of files based on file context
WO1994001821A1 (en) Trusted path subsystem for workstations

Legal Events

Date Code Title Description
AS Assignment

Owner name: TERMAN SOFTWARE APPLICATIONS L.L.C., DELAWARE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:HOFFMAN, TERRY GEORGE;REEL/FRAME:019888/0086

Effective date: 20070814